Monday, October 20, 2008

Hackers & Cellphones

Georgia Tech security researchers say that hackers will likely target cell phones for use in creating botnet armies. They say that as cell phones get more computing power and better Internet connections, hackers will be able to exploit vulnerabilities in mobile-phone operating systems and Web applications. Millions of PCs have already become part of botnets, and owners generally never know. The Georgia Tech researchers say that if cell phones become absorbed into botnets, new types of scams could be created. For example, infected phones could be programmed to call pay-per-minute 900 numbers, or to buy ringtones from companies established by criminals. The researchers say hackers are particularly drawn to cell phones because they are always on, they are always sending and receiving data, and they generally have poor security. "This is the perfect platform (for hackers)," says Georgia Tech professor Patrick Traynor. "There are some challenges for the adversaries, but we've seen them overcome the challenges in their way before." One challenge for hackers is learning how cellular networks work, which are tightly controlled by cell phone operators.

No comments: